Unit 3 Network Threats and Vulnerabilities

123456789101112131415161718192021222324252627
Across
  1. 2. Software which records and transmits key strokes
  2. 4. The use of fake websites to collect credentials from unsuspecting users.
  3. 7. Directive access control that sets out the expectations and responsibilities for employees.
  4. 10. Should be carried out yearly to ensure security systems are suitable and uptodate.
  5. 11. A range of methods that prey upon human mistakes rather than digital systems.
  6. 12. Types of attacks that change, damage or delete data and systems.
  7. 13. Applied to systems to fix known problems.
  8. 14. Uses a key to convert data into an unintelligible form.
  9. 15. Appears as or is part of a legitimate file but is actually malicious code.
  10. 17. determins which parts of an IP address should match or not for authorisation.
  11. 18. A _ would allow unauthorised users access to something.
  12. 20. The E in WEP (Something which should not be used anymore)
  13. 21. Leaving discarded, infected, portable media in the open hoping someone will run it on a device.
  14. 23. Following people closely through secured doors.
  15. 24. Once in a system will spread automatically depending on its programming.
  16. 26. The U in UAC
  17. 27. Hackers can make use of these to gain access to systems and bypass security.
Down
  1. 1. Checks incoming and outgoing traffic to ensure it is authorised based on credentials such as IP Addresses.
  2. 3. Where an identity is disguised to appear as a trusted source.
  3. 4. A type of attack when data is monitored and not changed.
  4. 5. Using an authorised users credentials when they are already logged in.
  5. 6. Anti Virus software keeps a record of known malicious code within this.
  6. 8. Fake emails used to gain information and credentials from targets.
  7. 9. This is what malware is short for.
  8. 10. After we _ users, they are given authorised access.
  9. 16. Requires human interaction to run.
  10. 19. An attack that encrypts data until a payment is made.
  11. 22. A type of attack that makes use of an exploit to bypass security measures.
  12. 25. A denial of service attack that makes use of multiple devices.